code logs -> 2013 -> Fri, 22 Mar 2013< code.20130321.log - code.20130323.log >
--- Log opened Fri Mar 22 00:00:45 2013
00:02 Derakon[AFK] is now known as Derakon
00:03
<&Derakon>
As opposed to what, hex?
00:04
<@gnolam>
Binary.
00:05 ToxicFrog|W`rkn is now known as ToxicFrog
00:06 mac [mac@Nightstar-f5917731.emhril.sbcglobal.net] has joined #code
00:10
<~Vornicus>
Clearly, base -2
00:11 mac [mac@Nightstar-f5917731.emhril.sbcglobal.net] has quit [[NS] Quit: Leaving]
00:17 VirusJTG [VirusJTG@Nightstar-09c31e7a.sta.comporium.net] has quit [[NS] Quit: Program Shutting down]
00:21 Rhamphoryncus [rhamph@Nightstar-f8b1f87b.abhsia.telus.net] has quit [Ping timeout: 121 seconds]
00:24 You're now known as TheWatcher[T-2]
00:30
< RichyB>
IIRC negative bases work. Three in base -2 is 101.
00:30
< RichyB>
er
00:30
< RichyB>
111
00:30
< RichyB>
4*1 - 2*1 + 1*1
00:31 You're now known as TheWatcher[zZzZ]
00:39
<~Vornicus>
yep.
00:39
<~Vornicus>
you can also get irrational bases and complex ones; knuth actually describes base 2i somewhere
00:43
<@Reiv>
... what.
00:44
<~Vornicus>
Which actually isn't too terribly weird
00:45
<~Vornicus>
well, okay, it is
00:46
<~Vornicus>
You take base -4: from -10 to +10 it's 32, 33, 20, 21, 22, 23, 10, 11, 12, 13, 0, 1, 2, 3, 130, 131, 132, 133, 120, 121
00:47
<~Vornicus>
and then interleave that with the digits for 2*Im(z)
00:47
<@Reiv>
... Im(z)
00:47
<~Vornicus>
imaginary part of the complex number z
00:47
<@Reiv>
I... see
00:47
<~Vornicus>
Re(2i + 3) is 3; Im(2i + 3) is 2
00:48
<@Reiv>
The real vs Im component of the number, right
01:01 VirusJTG [VirusJTG@Nightstar-09c31e7a.sta.comporium.net] has joined #code
01:05 Courage [Moltare@583787.FF2A18.190FE2.4D81A1] has quit [Ping timeout: 121 seconds]
01:08 Courage [Moltare@583787.FF2A18.190FE2.4D81A1] has joined #code
01:08 mode/#code [+o Courage] by ChanServ
01:49 Derakon is now known as Derakon[AFK]
01:54 Kindamoody[zZz] is now known as Kindamoody
02:29 mac [mac@Nightstar-fe8a1f12.il.comcast.net] has joined #code
02:55 Kindamoody is now known as Kindamoody[zZz]
03:12 cpux [cpux@Nightstar-98762b0f.dyn.optonline.net] has joined #code
03:12 mode/#code [+o cpux] by ChanServ
03:14 cpux|2 [cpux@Nightstar-98762b0f.dyn.optonline.net] has quit [Ping timeout: 121 seconds]
03:28 VirusJTG [VirusJTG@Nightstar-09c31e7a.sta.comporium.net] has quit [[NS] Quit: Program Shutting down]
03:57 celticminstrel [celticminst@Nightstar-e83b3651.cable.rogers.com] has quit [[NS] Quit: And lo! The computer falls into a deep sleep, to awake again some other day!]
03:58 cpux|2 [cpux@Nightstar-98762b0f.dyn.optonline.net] has joined #code
03:59 cpux [cpux@Nightstar-98762b0f.dyn.optonline.net] has quit [Ping timeout: 121 seconds]
04:20 mac [mac@Nightstar-fe8a1f12.il.comcast.net] has left #code ["Leaving"]
04:25 syksleep is now known as Syk
05:01 Kindamoody[zZz] is now known as Kindamoody
05:02 Derakon[AFK] is now known as Derakon
05:02
< JustBob>
Ah-HAH.
05:03
< JustBob>
Stupid final project extra credit!
05:03
< JustBob>
Damned thing was all 'hurr hurr let's not explain just what was going on''
05:03
< JustBob>
But fortunately, google is amazing!
05:37 Derakon is now known as Derakon[AFK]
05:59 himi [fow035@D741F1.243F35.CADC30.81D435] has quit [Ping timeout: 121 seconds]
08:07 himi [fow035@Nightstar-5d05bada.internode.on.net] has joined #code
08:08 mode/#code [+o himi] by ChanServ
09:14 Kindamoody is now known as Kindamoody|out
09:34 You're now known as TheWatcher
09:38 RichyB [richardb@Nightstar-86656b6c.cable.virginmedia.com] has quit [Ping timeout: 121 seconds]
10:08 Vornicus [vorn@ServerAdministrator.Nightstar.Net] has quit [[NS] Quit: Leaving]
10:35 RichyB [richardb@Nightstar-228a334c.plus.com] has joined #code
12:20 celticminstrel [celticminst@Nightstar-e83b3651.cable.rogers.com] has joined #code
12:21 mode/#code [+o celticminstrel] by ChanServ
13:38 ToxicFrog is now known as ToxicFrog|W`rkn
14:37 Kyte|Work [c80e6b02@Nightstar-36f67fd0.mibbit.com] has quit [[NS] Quit: http://www.mibbit.com ajax IRC Client]
14:37 Kyte|Work [c80e6b02@Nightstar-36f67fd0.mibbit.com] has joined #code
14:38 Kyte|Work [c80e6b02@Nightstar-36f67fd0.mibbit.com] has quit [[NS] Quit: http://www.mibbit.com ajax IRC Client]
14:38 Kyte|Work [c80e6b02@Nightstar-36f67fd0.mibbit.com] has joined #code
14:38 Kyte|Work [c80e6b02@Nightstar-36f67fd0.mibbit.com] has quit [[NS] Quit: http://www.mibbit.com ajax IRC Client]
14:38 Kyte|Work [c80e6b02@Nightstar-4fab16c5.mibbit.com] has joined #code
14:48 celticminstrel [celticminst@Nightstar-e83b3651.cable.rogers.com] has quit [[NS] Quit: And lo! The computer falls into a deep sleep, to awake again some other day!]
15:58 Derakon [chriswei@Nightstar-a3b183ae.ca.comcast.net] has joined #code
15:58 mode/#code [+ao Derakon Derakon] by ChanServ
15:59
<&Derakon>
For some reason this bit of code makes me happy. Given xVals and yVals, the X and Y pixels of a bead in an image, and x and y, their averages:
15:59
<&Derakon>
xDists = [(x - xi) ** 2 for xi in xVals]
15:59
<&Derakon>
yDists = [(y - yi) ** 2 for yi in yVals]
15:59
<&Derakon>
maxDistSquared = max(map(sum, zip(xDists, yDists)))
15:59
<&Derakon>
area = numpy.pi * maxDistSquared
16:06 Vornicus [vorn@ServerAdministrator.Nightstar.Net] has joined #code
16:06 mode/#code [+qo Vornicus Vornicus] by ChanServ
16:12
< RichyB>
Derakon: yeah, that's neat.
16:13
< RichyB>
It's lovely when comprehensions allow the code to look just like the equation in the geometry textbook.
16:14
<&Derakon>
I also appreciate that I didn't have to do a single square root.
17:02 Vornicus [vorn@ServerAdministrator.Nightstar.Net] has quit [[NS] Quit: Leaving]
17:06
< Kyte|Work>
(from xi in xVals from y in yVals let xDist = (x - xi)^2 let yDist = (y - xi)^2 select xDist + yDist).Max();
17:09
< Kyte|Work>
...actually
17:09
< Kyte|Work>
var area = Math.Pi * (from xi in xVals from y in yVals select (x - xi)^2 + (y - yi)^2).Max();
17:09
<&Derakon>
Yeah, it's not so much about shoving as much functionality onto one line as you can.
17:10
< Kyte|Work>
well it's not like I can put linebreaks in mibbit
17:10
< Kyte|Work>
otoh the v2 doesn't even need linebreaks
17:23 Kyte|Work [c80e6b02@Nightstar-4fab16c5.mibbit.com] has quit [[NS] Quit: http://www.mibbit.com ajax IRC Client]
17:38 Syk is now known as syksleep
17:39 * iospace noogies syksleep
17:39
<@iospace>
^_^
17:50 * syksleep beats iospace with a wrench
17:50
< syksleep>
slep tiem
17:50
<@iospace>
:<
17:51
<@iospace>
fine~
17:57 Kindamoody|out is now known as Kindamoody
18:00 AnnoDomini is now known as Wires
18:26 RichyB [richardb@Nightstar-228a334c.plus.com] has quit [[NS] Quit: >:3 This is BunThulhu. Copy him into your quit message to help him take over the Internet.]
18:39 Kindamoody is now known as Kindamoody[zZz]
19:02
<@iospace>
"The most dependable Windows for business computing" -XP Installer
19:02
<&McMartin>
In 2003 it was!
19:02
<@Tamber>
${More_goddamned_marketing_for_XP} -- XP Installer.
19:03
<&McMartin>
It wasn't the most *reliable* - that would have been Win2k - but Win2k also didn't run your programs~
19:08
< JustBob>
Lies.
19:08
< JustBob>
2k ran programs fine.
19:08 Derakon [chriswei@Nightstar-a3b183ae.ca.comcast.net] has quit [[NS] Quit: leaving]
19:34 celticminstrel [celticminst@Nightstar-e83b3651.cable.rogers.com] has joined #code
19:35 mode/#code [+o celticminstrel] by ChanServ
19:53 Vornicus [vorn@ServerAdministrator.Nightstar.Net] has joined #code
19:53 mode/#code [+qo Vornicus Vornicus] by ChanServ
21:25 VirusJTG [VirusJTG@Nightstar-09c31e7a.sta.comporium.net] has joined #code
21:49 Derakon[AFK] is now known as Derakon
22:35 Rhamphoryncus [rhamph@Nightstar-f8b1f87b.abhsia.telus.net] has joined #code
22:35 mode/#code [+o Rhamphoryncus] by ChanServ
22:35 * Rhamphoryncus nukes his router from orbit
22:36
<@Rhamphoryncus>
it somehow forgot how to route to me so I was completely off. Physical link lights were on but I couldn't get dhcp. Wireless worked fine
22:42 Derakon [Derakon@Nightstar-a3b183ae.ca.comcast.net] has quit [Operation timed out]
22:43 Derakon [Derakon@Nightstar-a3b183ae.ca.comcast.net] has joined #code
22:43 mode/#code [+ao Derakon Derakon] by ChanServ
23:00 ToxicFrog|W`rkn is now known as ToxicFrog
23:40
<&Derakon>
"The moral is obvious. You can't trust code that you did not totally create yourself. (Especially code from companies that employ people like me.)" -- Ken Thompson
23:40 * Derakon is just rereading his ACM presentation on the trojan horse he inserted into UNIX.
23:40
<&Derakon>
( http://cm.bell-labs.com/who/ken/trust.html for those who have not read it before)
23:41
<&Derakon>
Short version: modify the compiler to recognize when it is compiling the UNIX login command, and insert a special password option so Ken could login to any system compiled with that compiler.
23:42
<&Derakon>
Then modify the compiler to recognize when it was compiling itself, and insert the code that does the above modification as well as the code that does this modification.
23:42
<&Derakon>
Then revert the changes to the compiler's source code and recompile it.
23:43
<&Derakon>
Ta-da: any time that compiler compiles itself or the login command, it will produce a subverted binary.
23:43
<&Derakon>
With no evidence in the source code.
23:47
<~Vornicus>
That is one of the greatest essays on programming ever made.
23:52
<@Rhamphoryncus>
indeed
--- Log closed Sat Mar 23 00:00:59 2013
code logs -> 2013 -> Fri, 22 Mar 2013< code.20130321.log - code.20130323.log >

[ Latest log file ]